Posts tagged with Network Security

password
2 Factor Authentication · Cybersecurity Strategy · Data Security

Authentication on PCs: Recommendations from Security Experts

Authentication is an important part of working on a computer, whether logging on, opening encrypted data or using web services like PayPal. Usernames and passwords still play an important role, even...

hier nicht weiter
2 Factor Authentication · Cybersecurity Strategy · VPN

Another plea for multi-factor authentication

A hacking and cyberespionage group is currently targeting industrial control systems at energy companies. According to a survey by Symantec they have broken into 27 corporate networks so far. The...

juniper_logo
VPN

Progress through partnership

A VPN needs both a client and remote gateway. While NCP offers a complete solution with Secure Enterprise Client and Secure Enterprise VPN Server, some manufacturers only develop their own gateways....

Internet-of-Things
Cybersecurity Strategy · IT policy

Vulnerability scan for Industry 4.0 with LARS

Not a day goes by without Industry 4.0 being touted as the future of the manufacturing industry. And it's true, the digitization of production environments is already gaining traction, in some sectors...

iot
Cybersecurity Strategy · Internet of Things · VPN

Flaws in Industrial IoT Underline Importance of Secure Connectivity

According to the leading analyst firm Gartner Group over 50% of major new business processes and systems will incorporate some element of the Internet of Things (IoT) by the year 2020. The potential...

Cybersecurity Strategy · VPN

Threat Intelligence-as-a-Service brings SIEM Within Reach of SMEs

Organizations are being targeted by cybercriminals more than ever. According to the latest statistics from Symantec, 52.4% of phishing attacks in December 2015 were against small and medium-sized...

Business infographic icons set. Illustration eps10
Cybersecurity Strategy · IT policy

Big Data and IT Security – SIEM as an Analysis Tool

Over the last few years, gleaning useful information from massive amounts of data has also become more difficult for IT security and approaches to Big Data and information analysis are a critical...

Hands Around Table
VPN

How Far Does Your Cybersecurity Umbrella Extend?

Network administrators: No matter how impenetrable you think your network defenses are, there are always going to be remote access vulnerabilities that threaten the integrity of your walls. Often,...

Security Defense
Rethink Remote Access · VPN

Smaller Scale Is No Defense: Why SMBs Should Assume They’re Already Targets of Cyberattackers

You would be hard pressed to go a month without hearing about a new data breach or major cyberattack in the headlines. These incidents occur with such regularity nowadays that seemingly every industry...

Modern working desk with digital tablet
Rethink Remote Access · VPN

Seamless Roaming or Always On: The Remote Access VPN Feature Digital Nomads May Be Missing

In remote working environments, the Digital Nomad isn't tied to a desk or cubicle, but he has close relationships with his coworkers. The Digital Nomad works exclusively from mobile devices that...